US20070109978A1 - Method and system for secure conferencing - Google Patents
Method and system for secure conferencing Download PDFInfo
- Publication number
- US20070109978A1 US20070109978A1 US11/281,143 US28114305A US2007109978A1 US 20070109978 A1 US20070109978 A1 US 20070109978A1 US 28114305 A US28114305 A US 28114305A US 2007109978 A1 US2007109978 A1 US 2007109978A1
- Authority
- US
- United States
- Prior art keywords
- data streams
- endpoints
- selection parameters
- mixing
- secure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012545 processing Methods 0.000 claims description 9
- 230000000694 effects Effects 0.000 claims description 7
- 238000003780 insertion Methods 0.000 claims description 3
- 230000037431 insertion Effects 0.000 claims description 3
- 238000004590 computer program Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 239000002131 composite material Substances 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 239000000463 material Substances 0.000 description 4
- 239000000543 intermediate Substances 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 238000005259 measurement Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 239000004615 ingredient Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations
- H04L12/18—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0464—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload using hop-by-hop encryption, i.e. wherein an intermediate entity decrypts the information and re-encrypts it before forwarding it
Definitions
- Embodiments of the invention relate in general to communication techniques for conferencing. More specifically, embodiments of the invention relate to methods and systems for secure communication in conferencing.
- Modern communication techniques enable multiple endpoints at remote locations for simultaneous communication over conference calls.
- the endpoints correspond to speakers as well as to the listeners of the conference calls.
- a conference call may be organized, for example, as a teleconference or a videoconference.
- a teleconference may be supported by audio, video and data transmission devices such as a telephone, a radio, a television or a computer.
- a videoconference may be supported by telephony and video devices such as a web cam and a close-circuit television.
- the endpoints are not generally considered to be speakers. Endpoints corresponding to speakers are hereinafter referred to as relevant endpoints, which are selected, based on predefined parameters for the selection of the endpoints.
- the predefined parameters may include First Come First Serve (FCFS) and comparison of noise from an endpoint with a preset noise threshold.
- the predefined parameters may include classification of the signals from the endpoints, such as speech or silence. This classification is performed by a Voice Activity Detector (VAD).
- FCFS First Come First Serve
- VAD Voice Activity Detector
- ‘N’ data streams are decrypted and generated from the provided N endpoints.
- Decryption, dejitter, decoding, and VAD processing are applied to each stream, so that a speaker selection algorithm may select up to ‘M’ data streams as the active speakers in the conference.
- the speaker selection algorithm may use additional criteria, such as the relative loudness, to make the selection.
- the data stream path through such a conference, from a source endpoint to a receiver endpoint, is processed as described further. Initially, SRTP data streams are generated from all the endpoints, followed by the decryption of the generated data streams.
- VAD Voice Activity Detector
- the conference has to incur the cost of decryption, dejitter, and VAD processing of all N endpoints, of which N ⁇ M endpoints are not considered as relevant endpoints in conferencing.
- the endpoint receiver cannot monitor the decision, when to switch between the listener endpoint mix stream and one of the speaker endpoint mix streams. Therefore, it is difficult for an endpoint to receive any of the data streams selectively.
- FIG. 1 illustrates a network environment for secure conferencing, in accordance with various embodiments of the invention.
- FIG. 2 illustrates an endpoint, in accordance with an embodiment of the invention.
- FIG. 3 illustrates a network device, in accordance with an embodiment of the invention.
- FIG. 4 illustrates the various units of a mixing module, in accordance with an embodiment of the invention.
- FIG. 5 is a flowchart illustrating a method for secure conferencing, in accordance with various embodiments of the invention.
- FIG. 6 is a flowchart illustrating a method for the selection of a data stream by an endpoint, in accordance with an embodiment of the invention.
- FIG. 7 illustrates an endpoint, in accordance with an embodiment of the invention.
- FIG. 8 is a flow chart illustrating a method for secure conferencing, in accordance with an embodiment of the invention.
- Various embodiments of the invention provide methods, systems and computer program products for secure conferencing.
- Various embodiments of the invention provide methods and systems for sending endpoint selection parameters in the clear text region of the Secure Real-time Transport Protocol (SRTP).
- Voice Activity Detector (VAD) of each endpoint sends relevant endpoint selection parameters to a conference bridge. Endpoints are selected on the basis of the relevant endpoint selection parameters.
- a secure layer of data streams is generated from the data streams of the selected endpoints. ‘Relevant endpoints’ refer to the endpoints that are classified as speakers in the conference.
- the secure layer of data streams is then decrypted, and all possible mixes are generated from the decrypted data streams.
- the data streams are encrypted and a source identifier is inserted in each of the encrypted data streams.
- the encrypted data streams, with the inserted source identifiers, are distributed by multicasting at the endpoints. Accordingly, the endpoints can selectively receive any of the encrypted data streams, based on the source identifiers.
- FIG. 1 illustrates a network environment 100 for secure conferencing, in accordance with various embodiments of the invention.
- Network environment 100 includes a conference bridge 102 , a network device 104 , endpoints 106 such as endpoints 106 a , 106 b , 106 c and 106 d , and routers 108 such as routers 108 a , 108 b , 108 c , and 108 d .
- Conference bridge 102 can be, for example, a centralized conference bridge, a select and forward conference bridge, or a synchronized conference bridge.
- Conference bridge 102 sums up the input signals from each endpoint 106 . Subsequently, conference bridge 102 supplies the sum of the signals to each endpoint 106 .
- Endpoints 106 can be, for example, any devices that include means of communication. Examples of endpoints 106 include, but are not limited to, computers, Voice Over Internet Protocol (VOIP) devices, wireless phones, Personal Digital Assistants (PDAs), and fixed-line phones.
- VOIP Voice Over Internet Protocol
- PDAs Personal Digital Assistants
- endpoints 106 that are classified as speakers are selected as relevant endpoints.
- Data streams from selected endpoints 106 are sent to desired endpoints 106 through routers 108 present in network environment 100 .
- Routers 108 act as intermediates, transferring data packets between endpoints 106 and conference bridge 102 .
- Conference bridge 102 includes network device 104 .
- Network device 104 helps in selecting relevant endpoints 106 , mixing the selected data streams, inserting source identifiers in the encrypted streams, and distributing data streams by multicasting.
- FIG. 2 illustrates endpoint 106 , in accordance with an embodiment of the invention.
- each endpoint 106 includes a sending module 202 .
- Sending module 202 sends the relevant endpoint selection parameters on the basis of the classification of data streams by a Voice Activity Detector (VAD) 204 .
- VAD Voice Activity Detector
- the relevant endpoint selection parameters can include voice activity decision, signal level measurements, inactivity interval, and a time index indicating the beginning of talk spurt.
- the parameters may be provided in separate predefined fields.
- the parameters may be compressed, or combined into a single composite parameter.
- sending module 202 includes VAD 204 , which assigns a binary value to a frame of speech from the data streams generated from endpoints 106 .
- the binary value is assigned, based on the classification of the frame of speech, as speech or silence. For example, a frame of speech is assigned the value of ‘1’ if it is classified as speech and ‘0’ if it is classified as silence.
- VAD 204 classifies a frame of speech as speech or silence, based on a comparison between the average energy of the input data stream and a preset noise threshold.
- the binary value assigned by VAD 204 is sent to conference bridge 102 by sending module 202 .
- sending module 202 sends the binary value assigned by VAD 204 in the clear text region of the Secure Real-time Transport Protocol (SRTP) extension as unencrypted endpoint selection parameters.
- SRTP Secure Real-time Transport Protocol
- the SRTP provides end-to-end network transport functions that are suitable for applications transmitting real time data such as audio, video or simulation data over multicast or unicast network services.
- VAD 204 can be included in an intermediate device in network environment 100 .
- the intermediate device may be, for example, any computing device that is located between endpoint 106 and conference bridge 102 .
- FIG. 3 illustrates network device 104 , in accordance with an embodiment of the invention.
- network device 104 includes a receiving module 302 , a selecting module 304 , a data coder module 306 , and a mixing module 308 .
- Receiving module 302 receives the relevant endpoint selection parameters sent by VAD 204 on the basis of the classification of data streams.
- the relevant endpoint selection parameters can include voice activity decision, signal level measurements, inactivity interval, and a time index indicating the beginning of talk spurt.
- Selecting module 304 selects ‘M’ relevant endpoints 106 from provided ‘N’ endpoints 106 connected through conference bridge 102 . The selection is performed on the basis of the endpoint selection parameters received by receiving module 302 .
- the data streams from selected M endpoints 106 are encrypted by data coder module 306 .
- data coder module 306 also decrypts the encrypted data streams.
- Mixing module 308 generates all possible mixes of the decrypted data streams. Further, the generated streams are encrypted by data coder module 306 .
- mixing module 308 inserts a source identifier in each of the encrypted data streams, after which the data streams are distributed by multicasting at endpoints 106 .
- FIG. 4 illustrates the various units of mixing module 308 , in accordance with an embodiment of the invention.
- mixing module 308 includes a mixer 402 , an inserting module 404 , and a multicasting router 406 .
- Mixer 402 mixes the decrypted data streams from ‘M ⁇ 1’ endpoints 106 , and then generates all the possible data streams to be distributed by multicasting.
- mixer 402 mixes the decrypted streams from M endpoints 106 , to generate all the possible data streams to be distributed by multicasting. While generating all the possible data streams, mixer 402 ensures that contributions from given endpoint 106 are not sent back to same endpoint 106 .
- mixer 402 generates a different composite data stream for each of selected M endpoint 106 . If all provided N endpoints 106 are selected, then M is equal to N. In this situation, mixer 402 generates M data streams, which each endpoint 106 receives as a unique data stream summation comprised of the other ‘M ⁇ 1’ data streams. In another embodiment of the invention where M is less then N, there are different ‘M+1’ composite data streams generated by mixer 402 . Of the generated M+1 data streams, M data streams are generated, to be received by M endpoints 106 in the conference. Further, an additional data stream is generated, to be received by the remaining ‘N ⁇ M’ endpoints 106 in the conference.
- inserting module 404 inserts the source identifier in the encrypted data streams.
- the source identifier can be, for example, synchronization source identifier (SSRC) and contributing source identifiers (CSRC).
- the SSRC identifies endpoint 106 from which the data stream has originally generated. Each data stream has a different SSRC, which is a number that is randomly assigned when a new data stream is generated.
- inserting module 404 inserts the SSRC of each of the original decrypted streams as a list in the CSRC.
- the CSRC enables endpoint 106 to detect changes in the source. Endpoint 106 can detect the change by checking the list of SSRCs included in the CSRC. Therefore, in accordance with various embodiments, a data stream can be selectively discarded when endpoint 106 is an active speaker.
- detection of changes in the source can facilitate providing source specific treatment to respective streams. For example, an independent gain may be applied to the data streams.
- the source identifier facilitates the selection of the desired data stream by endpoints 106 . Endpoints 106 can selectively receive any of the data streams on the basis of examination of the list contained in the CSRC.
- the encrypted data stream is distributed by multicasting router 406 in a multicast process.
- Multicast is a one to many operation process.
- conference bridge 102 when endpoints 106 are connected by multicasting router 406 then conference bridge 102 generates only one output data stream for the entire multicast group.
- a multicast group is defined as a group where each endpoint 106 is connected to multicasting router 406 .
- the network replicates the data streams and forwards the replicas by multicasting router 406 to each endpoint 106 connected in the multicast group.
- FIG. 5 is a flow chart illustrating a method for secure conferencing, in accordance with various embodiments of the invention.
- receiving module 302 receives the relevant endpoint selection parameters in the clear text region of the SRTP.
- receiving module 302 receives the relevant endpoint selection parameters at conference bridge 102 in the clear text region of the RTP.
- selecting module 304 selects relevant M number of endpoints 106 from the provided N number of endpoints 106 . The selection is performed on the basis of the received relevant selection endpoint parameters. Once M endpoints 106 are selected, a layer of SRTP data streams is generated from M endpoints 106 .
- Generated data streams are then decrypted by data coder module 306 .
- decrypted data streams are mixed by mixer 402 to generate all possible data streams.
- the generated data streams are then encrypted and distributed by multicasting at endpoints 106 .
- FIG. 6 is a flowchart illustrating a method for the selection of a data stream by endpoint 106 , in accordance with an embodiment of the invention.
- a secure layer of SRTP data streams is generated from M endpoints 106 .
- the generated data streams are decrypted by data coder module 306 .
- mixing of the data streams is carried out by mixer 402 , to generate all possible data streams.
- the data streams generated by mixer 402 are encrypted by data coder module 306 .
- inserting module 404 inserts a source identifier in each of the encrypted data streams.
- the source identifier is a list of the SSRCs of the individual data streams before mixing. Once the source identifier is inserted, then, at step 612 , the encrypted data streams are distributed at endpoints 106 by multicasting. Multicasting at endpoints 106 is carried out by multicasting routers 406 in mixing module 308 . At step 614 , endpoints 106 selectively receive any of the encrypted data streams on the basis of an inserted source identifier.
- FIG. 7 illustrates endpoint 106 , in accordance with an embodiment of the invention.
- Each endpoint 106 includes a mixing module 702 , along with sending module 202 and VAD 204 as described with reference to FIG. 2 .
- Mixing module 702 performs the mixing of the decrypted data streams at endpoint 106 .
- FIG. 8 is a flow chart illustrating a method for secure conferencing, in accordance with various embodiments of the invention.
- sending module 202 sends the relevant endpoint selection parameters in the clear text region of the SRTP.
- sending module 202 sends the relevant endpoint selection parameters to conference bridge 102 in the clear text region of the RTP.
- selecting module 202 selects relevant M number of endpoints 106 from the provided N number of endpoints 106 . Once M endpoints 106 are selected, a layer of SRTP data streams is generated from M endpoints 106 . Generated data streams are then decrypted by a data coder module 306 .
- mixing of the data streams is performed at endpoints 106 .
- the mixing of the decrypted data streams is performed by mixing module 702 included in each endpoint 106 .
- the unencrypted VAD 204 parameters are sent in a clear text region of the SRTP packet.
- the VAD 204 parameters can be sent in the clear text region of the RTP extension.
- Relevant endpoints 106 are selected on the basis of the sent VAD 204 parameters. Data streams from selected endpoints 106 are generated for mixing by mixing module 308 . Thereafter, the data streams are forwarded to desired endpoints 106 .
- the cryptographic context of all the provided endpoints is maintained.
- the cryptographic context includes parameters that are necessary to process an SRTP stream.
- the parameters include state dependent or time varying items such as Roll Over Counter and replay list that must be maintained. Further, an invalid context may cause undesirable results during SRTP processing.
- mixing of the data streams can be performed at endpoints 106 .
- the data streams can be distributed by multicasting to endpoints 106 .
- Multicast is a one to many operation process.
- conference bridge 102 when endpoints 106 are connected by multicasting router 406 , conference bridge 102 generates only one output data stream for the entire multicast group.
- a multicast group is defined as a group in which each endpoint 106 is connected to multicasting router 406 .
- the network replicates the data streams and forwards the replicas by multicasting router 406 to each endpoint 106 connected to the multicast group.
- the data streams that are identified as generated from relevant endpoints 106 are distributed by multicast to endpoints 106 . Further, these are selectively mixed at endpoints 106 by mixing module 308 . In accordance with various embodiments, mixing of all selected data streams takes place at endpoints 106 , except the data streams that are generated from the same endpoints 106 . Relevant endpoints 106 are referred to endpoints 106 , which are selected on the basis of the sent VAD parameters.
- the data streams generated from the relevant endpoints 106 (M) from provided number of endpoints 106 (N) are mixed by mixing module 308 .
- Mixer 402 present in mixing module 308 , generates all the possible mixes from the data streams. While generating all the possible data streams, mixer 402 ensures that contributions from a given endpoint 106 are not sent back to same endpoint 106 . Therefore, mixer 402 generates a different composite data stream for each selected M endpoint 106 . If all provided endpoints 106 (N) are selected, then M is equal to N. In this situation, mixer 402 generates M data streams, which each endpoint 106 receives as a unique data stream summation comprised of the other ‘M ⁇ 1’ data streams.
- inserting module 404 inserts source identifiers in each of the data streams. Endpoints 106 can selectively receive any of the data streams on the basis of the source identifiers, since source identifiers enable endpoints 106 to determine when to switch between listener endpoint 106 data stream and one of M speaker endpoint 106 data streams. Listener endpoints 106 correspond to ‘N ⁇ M’ endpoints 106 and speaker endpoints 106 corresponds to M endpoints 106 .
- the decryption, the dejitter, the decoding and VAD 204 processing of non-relevant endpoints 106 is avoided.
- Various embodiments of the invention generate all possible mixes of data streams with the insertion of a source identifier. This enables endpoints 106 to determine when to switch between the listener endpoint 106 data stream and one of the speaker endpoint 106 data streams on the basis of the source identifier. Therefore, the complexity of endpoint 106 receiver is limited to a single secure data stream.
- peer can include any type of device, operation, or other process.
- the present invention can operate between any two processes or entities including users, devices, functional systems, or combinations of hardware and software.
- Peer-to-peer networks and any other networks or systems where the roles of client and server are switched, change dynamically, or are not even present, are within the scope of the invention.
- routines of the present invention can be implemented using C, C++, Java, assembly language, etc.
- Different programming techniques such as procedural or object oriented can be employed.
- the routines can execute on a single processing device or multiple processors. Although the steps, operations, or computations may be presented in a specific order, this order may be changed in different embodiments. In some embodiments, multiple steps shown sequentially in this specification can be performed at the same time.
- the sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc.
- the routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing.
- a ‘computer’ for purposes of embodiments of the present invention may include any processor-containing device, such as a mainframe computer, personal computer, laptop, notebook, microcomputer, server, personal data manager or ‘PIM’ (also referred to as a personal information manager), smart cellular or other phone, so-called smart card, set-top box, or any of the like.
- a ‘computer program’ may include any suitable locally or remotely executable program or sequence of coded instructions, which are to be inserted into a computer, well known to those skilled in the art. Stated more specifically, a computer program includes an organized list of instructions that, when executed, causes the computer to behave in a predetermined manner.
- a computer program contains a list of ingredients (called variables) and a list of directions (called statements) that tell the computer what to do with the variables.
- the variables may represent numeric data, text, audio or graphical images. If a computer is employed for presenting media via a suitable directly or indirectly coupled input/output (I/O) device, the computer would have suitable instructions for allowing a user to input or output (e.g., present) program code and/or data information respectively in accordance with the embodiments of the present invention.
- I/O input/output
- a ‘computer readable medium’ for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the computer program for use by or in connection with the instruction execution system apparatus, system or device.
- the computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
- At least some of the components of an embodiment of the invention may be implemented by using a programmed general-purpose digital computer, by using application specific integrated circuits, programmable logic devices, or field programmable gate arrays, or by using a network of interconnected components and circuits. Connections may be wired, wireless, by modem, and the like.
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- 1. Field of Invention
- Embodiments of the invention relate in general to communication techniques for conferencing. More specifically, embodiments of the invention relate to methods and systems for secure communication in conferencing.
- 2. Description of the Background Art
- Modern communication techniques enable multiple endpoints at remote locations for simultaneous communication over conference calls. The endpoints correspond to speakers as well as to the listeners of the conference calls. A conference call may be organized, for example, as a teleconference or a videoconference. A teleconference may be supported by audio, video and data transmission devices such as a telephone, a radio, a television or a computer. A videoconference may be supported by telephony and video devices such as a web cam and a close-circuit television.
- In conference calls with multiple endpoints, all the endpoints are not generally considered to be speakers. Endpoints corresponding to speakers are hereinafter referred to as relevant endpoints, which are selected, based on predefined parameters for the selection of the endpoints. For example, the predefined parameters may include First Come First Serve (FCFS) and comparison of noise from an endpoint with a preset noise threshold. Further, the predefined parameters may include classification of the signals from the endpoints, such as speech or silence. This classification is performed by a Voice Activity Detector (VAD).
- In a conventional method for secure conferencing, ‘N’ data streams are decrypted and generated from the provided N endpoints. Decryption, dejitter, decoding, and VAD processing are applied to each stream, so that a speaker selection algorithm may select up to ‘M’ data streams as the active speakers in the conference. When more than M data streams are active, the speaker selection algorithm may use additional criteria, such as the relative loudness, to make the selection. The data stream path through such a conference, from a source endpoint to a receiver endpoint, is processed as described further. Initially, SRTP data streams are generated from all the endpoints, followed by the decryption of the generated data streams. Thereafter, the process of decoding the data streams is performed, and Voice Activity Detector (VAD) processing is applied to select the relevant endpoints. If M endpoints are selected from a provided number of N endpoints, then audio mixing of M endpoints is performed. Thereafter, the mixed data streams are encoded. Further, a secure encryption of the encoded streams is performed. Finally, SRTP streams are received at the endpoints.
- Therefore, in the conventional method, the conference has to incur the cost of decryption, dejitter, and VAD processing of all N endpoints, of which N−M endpoints are not considered as relevant endpoints in conferencing.
- Conventionally, in a conference that has multiple endpoints, the endpoint receiver cannot monitor the decision, when to switch between the listener endpoint mix stream and one of the speaker endpoint mix streams. Therefore, it is difficult for an endpoint to receive any of the data streams selectively.
-
FIG. 1 illustrates a network environment for secure conferencing, in accordance with various embodiments of the invention. -
FIG. 2 illustrates an endpoint, in accordance with an embodiment of the invention. -
FIG. 3 illustrates a network device, in accordance with an embodiment of the invention. -
FIG. 4 illustrates the various units of a mixing module, in accordance with an embodiment of the invention. -
FIG. 5 is a flowchart illustrating a method for secure conferencing, in accordance with various embodiments of the invention. -
FIG. 6 is a flowchart illustrating a method for the selection of a data stream by an endpoint, in accordance with an embodiment of the invention. -
FIG. 7 illustrates an endpoint, in accordance with an embodiment of the invention. -
FIG. 8 is a flow chart illustrating a method for secure conferencing, in accordance with an embodiment of the invention. - Various embodiments of the invention provide methods, systems and computer program products for secure conferencing. Various embodiments of the invention provide methods and systems for sending endpoint selection parameters in the clear text region of the Secure Real-time Transport Protocol (SRTP). Voice Activity Detector (VAD) of each endpoint sends relevant endpoint selection parameters to a conference bridge. Endpoints are selected on the basis of the relevant endpoint selection parameters. Further, a secure layer of data streams is generated from the data streams of the selected endpoints. ‘Relevant endpoints’ refer to the endpoints that are classified as speakers in the conference. The secure layer of data streams is then decrypted, and all possible mixes are generated from the decrypted data streams. Thereafter, the data streams are encrypted and a source identifier is inserted in each of the encrypted data streams. The encrypted data streams, with the inserted source identifiers, are distributed by multicasting at the endpoints. Accordingly, the endpoints can selectively receive any of the encrypted data streams, based on the source identifiers.
-
FIG. 1 illustrates anetwork environment 100 for secure conferencing, in accordance with various embodiments of the invention.Network environment 100 includes aconference bridge 102, anetwork device 104,endpoints 106 such as 106 a, 106 b, 106 c and 106 d, and routers 108 such asendpoints 108 a, 108 b, 108 c, and 108 d.routers Conference bridge 102 can be, for example, a centralized conference bridge, a select and forward conference bridge, or a synchronized conference bridge.Conference bridge 102 sums up the input signals from eachendpoint 106. Subsequently,conference bridge 102 supplies the sum of the signals to eachendpoint 106.Endpoints 106 can be, for example, any devices that include means of communication. Examples ofendpoints 106 include, but are not limited to, computers, Voice Over Internet Protocol (VOIP) devices, wireless phones, Personal Digital Assistants (PDAs), and fixed-line phones. - In accordance with various embodiments of the invention,
endpoints 106 that are classified as speakers are selected as relevant endpoints. Data streams from selectedendpoints 106 are sent to desiredendpoints 106 through routers 108 present innetwork environment 100. Routers 108 act as intermediates, transferring data packets betweenendpoints 106 andconference bridge 102. -
Conference bridge 102 includesnetwork device 104.Network device 104 helps in selectingrelevant endpoints 106, mixing the selected data streams, inserting source identifiers in the encrypted streams, and distributing data streams by multicasting. -
FIG. 2 illustratesendpoint 106, in accordance with an embodiment of the invention. In accordance with various embodiments of the invention, eachendpoint 106 includes asending module 202.Sending module 202 sends the relevant endpoint selection parameters on the basis of the classification of data streams by a Voice Activity Detector (VAD) 204. The relevant endpoint selection parameters can include voice activity decision, signal level measurements, inactivity interval, and a time index indicating the beginning of talk spurt. The parameters may be provided in separate predefined fields. In accordance with an embodiment, the parameters may be compressed, or combined into a single composite parameter. In accordance with various embodiments of the invention, sendingmodule 202 includesVAD 204, which assigns a binary value to a frame of speech from the data streams generated fromendpoints 106. In accordance with various embodiments, the binary value is assigned, based on the classification of the frame of speech, as speech or silence. For example, a frame of speech is assigned the value of ‘1’ if it is classified as speech and ‘0’ if it is classified as silence.VAD 204 classifies a frame of speech as speech or silence, based on a comparison between the average energy of the input data stream and a preset noise threshold. The binary value assigned byVAD 204 is sent toconference bridge 102 by sendingmodule 202. In an embodiment of the invention, sendingmodule 202 sends the binary value assigned byVAD 204 in the clear text region of the Secure Real-time Transport Protocol (SRTP) extension as unencrypted endpoint selection parameters. The SRTP provides end-to-end network transport functions that are suitable for applications transmitting real time data such as audio, video or simulation data over multicast or unicast network services. In an embodiment of the invention,VAD 204 can be included in an intermediate device innetwork environment 100. The intermediate device may be, for example, any computing device that is located betweenendpoint 106 andconference bridge 102. -
FIG. 3 illustratesnetwork device 104, in accordance with an embodiment of the invention. In accordance with various embodiments of the invention,network device 104 includes a receivingmodule 302, a selectingmodule 304, adata coder module 306, and amixing module 308. Receivingmodule 302 receives the relevant endpoint selection parameters sent byVAD 204 on the basis of the classification of data streams. The relevant endpoint selection parameters can include voice activity decision, signal level measurements, inactivity interval, and a time index indicating the beginning of talk spurt. Selectingmodule 304 selects ‘M’relevant endpoints 106 from provided ‘N’endpoints 106 connected throughconference bridge 102. The selection is performed on the basis of the endpoint selection parameters received by receivingmodule 302. The data streams from selectedM endpoints 106 are encrypted bydata coder module 306. In an embodiment of the invention,data coder module 306 also decrypts the encrypted data streams. Mixingmodule 308 generates all possible mixes of the decrypted data streams. Further, the generated streams are encrypted bydata coder module 306. In an embodiment of the invention, mixingmodule 308 inserts a source identifier in each of the encrypted data streams, after which the data streams are distributed by multicasting atendpoints 106. -
FIG. 4 illustrates the various units of mixingmodule 308, in accordance with an embodiment of the invention. In accordance with various embodiments of the invention, mixingmodule 308 includes amixer 402, an insertingmodule 404, and amulticasting router 406.Mixer 402 mixes the decrypted data streams from ‘M−1’endpoints 106, and then generates all the possible data streams to be distributed by multicasting. In an embodiment of theinvention mixer 402 mixes the decrypted streams fromM endpoints 106, to generate all the possible data streams to be distributed by multicasting. While generating all the possible data streams,mixer 402 ensures that contributions from givenendpoint 106 are not sent back tosame endpoint 106. Therefore,mixer 402 generates a different composite data stream for each of selectedM endpoint 106. If all providedN endpoints 106 are selected, then M is equal to N. In this situation,mixer 402 generates M data streams, which eachendpoint 106 receives as a unique data stream summation comprised of the other ‘M−1’ data streams. In another embodiment of the invention where M is less then N, there are different ‘M+1’ composite data streams generated bymixer 402. Of the generated M+1 data streams, M data streams are generated, to be received byM endpoints 106 in the conference. Further, an additional data stream is generated, to be received by the remaining ‘N−M’endpoints 106 in the conference. - The mixing of the data streams is followed by their encryption by
data coder module 306. Further, insertingmodule 404 inserts the source identifier in the encrypted data streams. The source identifier can be, for example, synchronization source identifier (SSRC) and contributing source identifiers (CSRC). The SSRC identifiesendpoint 106 from which the data stream has originally generated. Each data stream has a different SSRC, which is a number that is randomly assigned when a new data stream is generated. Whenmixer 402 mixes the decrypted data streams, and generates all possible streams, insertingmodule 404 inserts the SSRC of each of the original decrypted streams as a list in the CSRC. The CSRC enablesendpoint 106 to detect changes in the source.Endpoint 106 can detect the change by checking the list of SSRCs included in the CSRC. Therefore, in accordance with various embodiments, a data stream can be selectively discarded whenendpoint 106 is an active speaker. - Further, detection of changes in the source can facilitate providing source specific treatment to respective streams. For example, an independent gain may be applied to the data streams. The source identifier facilitates the selection of the desired data stream by
endpoints 106.Endpoints 106 can selectively receive any of the data streams on the basis of examination of the list contained in the CSRC. - After the insertion of the source identifier, the encrypted data stream is distributed by
multicasting router 406 in a multicast process. Multicast is a one to many operation process. In an embodiment of the invention, whenendpoints 106 are connected by multicastingrouter 406 thenconference bridge 102 generates only one output data stream for the entire multicast group. A multicast group is defined as a group where eachendpoint 106 is connected tomulticasting router 406. The network replicates the data streams and forwards the replicas by multicastingrouter 406 to eachendpoint 106 connected in the multicast group. -
FIG. 5 is a flow chart illustrating a method for secure conferencing, in accordance with various embodiments of the invention. Atstep 502, receivingmodule 302 receives the relevant endpoint selection parameters in the clear text region of the SRTP. In an embodiment of the invention, receivingmodule 302 receives the relevant endpoint selection parameters atconference bridge 102 in the clear text region of the RTP. Atstep 504, selectingmodule 304, selects relevant M number ofendpoints 106 from the provided N number ofendpoints 106. The selection is performed on the basis of the received relevant selection endpoint parameters. OnceM endpoints 106 are selected, a layer of SRTP data streams is generated fromM endpoints 106. Generated data streams are then decrypted bydata coder module 306. Atstep 506, decrypted data streams are mixed bymixer 402 to generate all possible data streams. The generated data streams are then encrypted and distributed by multicasting atendpoints 106. -
FIG. 6 is a flowchart illustrating a method for the selection of a data stream byendpoint 106, in accordance with an embodiment of the invention. Oncerelevant M endpoints 106 are selected, then, atstep 602, a secure layer of SRTP data streams is generated fromM endpoints 106. Atstep 604, the generated data streams are decrypted bydata coder module 306. Thereafter, atstep 606, mixing of the data streams is carried out bymixer 402, to generate all possible data streams. Then, atstep 608, the data streams generated bymixer 402 are encrypted bydata coder module 306. Atstep 610, insertingmodule 404 inserts a source identifier in each of the encrypted data streams. The source identifier is a list of the SSRCs of the individual data streams before mixing. Once the source identifier is inserted, then, atstep 612, the encrypted data streams are distributed atendpoints 106 by multicasting. Multicasting atendpoints 106 is carried out by multicastingrouters 406 in mixingmodule 308. Atstep 614,endpoints 106 selectively receive any of the encrypted data streams on the basis of an inserted source identifier. - In accordance with an embodiment of the invention, the mixing of decrypted data streams is performed at
endpoints 106 instead ofconference bridge 102.FIG. 7 illustratesendpoint 106, in accordance with an embodiment of the invention. Eachendpoint 106 includes amixing module 702, along with sendingmodule 202 andVAD 204 as described with reference toFIG. 2 . Mixingmodule 702 performs the mixing of the decrypted data streams atendpoint 106. -
FIG. 8 is a flow chart illustrating a method for secure conferencing, in accordance with various embodiments of the invention. Atstep 802, sendingmodule 202, sends the relevant endpoint selection parameters in the clear text region of the SRTP. In an embodiment of the invention, sendingmodule 202 sends the relevant endpoint selection parameters toconference bridge 102 in the clear text region of the RTP. On the basis of the sent endpoint relevant selection parameters, selectingmodule 202, selects relevant M number ofendpoints 106 from the provided N number ofendpoints 106. OnceM endpoints 106 are selected, a layer of SRTP data streams is generated fromM endpoints 106. Generated data streams are then decrypted by adata coder module 306. - Further, at
step 804, mixing of the data streams is performed atendpoints 106. In accordance with an embodiment of the invention, the mixing of the decrypted data streams is performed by mixingmodule 702 included in eachendpoint 106. - In an embodiment of the invention, the
unencrypted VAD 204 parameters are sent in a clear text region of the SRTP packet. In another embodiment of the invention, theVAD 204 parameters can be sent in the clear text region of the RTP extension.Relevant endpoints 106 are selected on the basis of the sentVAD 204 parameters. Data streams from selectedendpoints 106 are generated for mixing by mixingmodule 308. Thereafter, the data streams are forwarded to desiredendpoints 106. - In an embodiment of the invention, the cryptographic context of all the provided endpoints is maintained. The cryptographic context includes parameters that are necessary to process an SRTP stream. The parameters include state dependent or time varying items such as Roll Over Counter and replay list that must be maintained. Further, an invalid context may cause undesirable results during SRTP processing.
- In an embodiment of the invention, mixing of the data streams can be performed at
endpoints 106. In another embodiment of the invention, once mixing of data streams is performed bymixer 402, present in theconference bridge 102, the data streams can be distributed by multicasting toendpoints 106. Multicast is a one to many operation process. In an embodiment of the invention, whenendpoints 106 are connected by multicastingrouter 406,conference bridge 102 generates only one output data stream for the entire multicast group. A multicast group is defined as a group in which eachendpoint 106 is connected tomulticasting router 406. The network replicates the data streams and forwards the replicas by multicastingrouter 406 to eachendpoint 106 connected to the multicast group. - In an embodiment of the invention, the data streams that are identified as generated from
relevant endpoints 106 are distributed by multicast toendpoints 106. Further, these are selectively mixed atendpoints 106 by mixingmodule 308. In accordance with various embodiments, mixing of all selected data streams takes place atendpoints 106, except the data streams that are generated from thesame endpoints 106.Relevant endpoints 106 are referred toendpoints 106, which are selected on the basis of the sent VAD parameters. - In an embodiment of the invention, the data streams generated from the relevant endpoints 106 (M) from provided number of endpoints 106 (N) are mixed by mixing
module 308.Mixer 402, present in mixingmodule 308, generates all the possible mixes from the data streams. While generating all the possible data streams,mixer 402 ensures that contributions from a givenendpoint 106 are not sent back tosame endpoint 106. Therefore,mixer 402 generates a different composite data stream for each selectedM endpoint 106. If all provided endpoints 106 (N) are selected, then M is equal to N. In this situation,mixer 402 generates M data streams, which eachendpoint 106 receives as a unique data stream summation comprised of the other ‘M−1’ data streams. In another embodiment of the invention where M is less then N, there are different ‘M+1’ composite data streams generated by mixer 402.Of the generated M+1 data streams, M data streams are generated, to be sent to each ofM endpoints 106 in the conference. Further, an additional data stream is generated to be sent to remaining ‘N−M’endpoints 106 in the conference. Once all the data streams are generated bymixer 402, insertingmodule 404 inserts source identifiers in each of the data streams.Endpoints 106 can selectively receive any of the data streams on the basis of the source identifiers, since source identifiers enableendpoints 106 to determine when to switch betweenlistener endpoint 106 data stream and one ofM speaker endpoint 106 data streams.Listener endpoints 106 correspond to ‘N−M’endpoints 106 andspeaker endpoints 106 corresponds toM endpoints 106. - In accordance with various embodiments of the invention, the decryption, the dejitter, the decoding and
VAD 204 processing ofnon-relevant endpoints 106 is avoided. Various embodiments of the invention generate all possible mixes of data streams with the insertion of a source identifier. This enablesendpoints 106 to determine when to switch between thelistener endpoint 106 data stream and one of thespeaker endpoint 106 data streams on the basis of the source identifier. Therefore, the complexity ofendpoint 106 receiver is limited to a single secure data stream. - Although specific protocols have been used to describe embodiments, other embodiments can use other transmission protocols or standards. Use of the terms ‘peer’, ‘client’, and ‘server’ can include any type of device, operation, or other process. The present invention can operate between any two processes or entities including users, devices, functional systems, or combinations of hardware and software. Peer-to-peer networks and any other networks or systems where the roles of client and server are switched, change dynamically, or are not even present, are within the scope of the invention.
- Any suitable programming language can be used to implement the routines of the present invention including C, C++, Java, assembly language, etc. Different programming techniques such as procedural or object oriented can be employed. The routines can execute on a single processing device or multiple processors. Although the steps, operations, or computations may be presented in a specific order, this order may be changed in different embodiments. In some embodiments, multiple steps shown sequentially in this specification can be performed at the same time. The sequence of operations described herein can be interrupted, suspended, or otherwise controlled by another process, such as an operating system, kernel, etc. The routines can operate in an operating system environment or as stand-alone routines occupying all, or a substantial part, of the system processing.
- In the description herein for embodiments of the present invention, numerous specific details are provided, such as examples of components and/or methods, to provide a thorough understanding of embodiments of the present invention. One skilled in the relevant art will recognize, however, that an embodiment of the invention can be practiced without one or more of the specific details, or with other apparatus, systems, assemblies, methods, components, materials, parts, and/or the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of embodiments of the present invention.
- In addition, in the description herein for embodiments of the present invention, a portion of the disclosure recited in the specification contains material, which is subject to copyright protection. Computer program source code, object code, instructions, text or other functional information that is executable by a machine may be included in an appendix, tables, figures or in other forms. The copyright owner has no objection to the facsimile reproduction of the specification as filed in the Patent and Trademark Office. Otherwise all copyright rights are reserved.
- A ‘computer’ for purposes of embodiments of the present invention may include any processor-containing device, such as a mainframe computer, personal computer, laptop, notebook, microcomputer, server, personal data manager or ‘PIM’ (also referred to as a personal information manager), smart cellular or other phone, so-called smart card, set-top box, or any of the like. A ‘computer program’ may include any suitable locally or remotely executable program or sequence of coded instructions, which are to be inserted into a computer, well known to those skilled in the art. Stated more specifically, a computer program includes an organized list of instructions that, when executed, causes the computer to behave in a predetermined manner. A computer program contains a list of ingredients (called variables) and a list of directions (called statements) that tell the computer what to do with the variables. The variables may represent numeric data, text, audio or graphical images. If a computer is employed for presenting media via a suitable directly or indirectly coupled input/output (I/O) device, the computer would have suitable instructions for allowing a user to input or output (e.g., present) program code and/or data information respectively in accordance with the embodiments of the present invention.
- A ‘computer readable medium’ for purposes of embodiments of the present invention may be any medium that can contain, store, communicate, propagate, or transport the computer program for use by or in connection with the instruction execution system apparatus, system or device. The computer readable medium can be, by way of example only but not by limitation, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, system, device, propagation medium, or computer memory.
- Reference throughout this specification to “one embodiment”, “an embodiment”, or “a specific embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention and not necessarily in all embodiments. Thus, respective appearances of the phrases “in one embodiment”, “in an embodiment”, or “in a specific embodiment” in various places throughout this specification are not necessarily referring to the same embodiment. Furthermore, the particular features, structures, or characteristics of any specific embodiment of the present invention may be combined in any suitable manner with one or more other embodiments. It is to be understood that other variations and modifications of the embodiments of the present invention described and illustrated herein are possible in light of the teachings herein and are to be considered as part of the spirit and scope of the present invention.
- Further, at least some of the components of an embodiment of the invention may be implemented by using a programmed general-purpose digital computer, by using application specific integrated circuits, programmable logic devices, or field programmable gate arrays, or by using a network of interconnected components and circuits. Connections may be wired, wireless, by modem, and the like.
- It will also be appreciated that one or more of the elements depicted in the drawings/figures can also be implemented in a more separated or integrated manner, or even removed or rendered as inoperable in certain cases, as is useful in accordance with a particular application.
- Additionally, any signal arrows in the drawings/Figures should be considered only as exemplary, and not limiting, unless otherwise specifically noted. Combinations of components or steps will also be considered as being noted, where terminology is foreseen as rendering the ability to separate or combine is unclear.
- As used in the description herein and throughout the claims that follow, “a”, “an”, and “the” includes plural references unless the context clearly dictates otherwise. In addition, as used in the description herein and throughout the claims that follow, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
- The foregoing description of illustrated embodiments of the present invention, including what is described in the abstract, is not intended to be exhaustive or to limit the invention to the precise forms disclosed herein. While specific embodiments of, and examples for, the invention are described herein for illustrative purposes only, various equivalent modifications are possible within the spirit and scope of the present invention, as those skilled in the relevant art will recognize and appreciate. As indicated, these modifications may be made to the present invention in light of the foregoing description of illustrated embodiments of the present invention and are to be included within the spirit and scope of the present invention.
- Thus, while the present invention has been described herein with reference to particular embodiments thereof, a latitude of modification, various changes and substitutions are intended in the foregoing disclosures, and it will be appreciated that in some instances some features of embodiments of the invention will be employed without a corresponding use of other features without departing from the scope and spirit of the invention as set forth. Therefore, many modifications may be made to adapt a particular situation or material to the essential scope and spirit of the present invention. It is intended that the invention not be limited to the particular terms used in following claims and/or to the particular embodiment disclosed as the best mode contemplated for carrying out this invention, but that the invention will include any and all embodiments and equivalents falling within the scope of the appended claims.
Claims (23)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/281,143 US8223673B2 (en) | 2005-11-16 | 2005-11-16 | Method and system for secure conferencing |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US11/281,143 US8223673B2 (en) | 2005-11-16 | 2005-11-16 | Method and system for secure conferencing |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20070109978A1 true US20070109978A1 (en) | 2007-05-17 |
| US8223673B2 US8223673B2 (en) | 2012-07-17 |
Family
ID=38040695
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US11/281,143 Active 2029-12-18 US8223673B2 (en) | 2005-11-16 | 2005-11-16 | Method and system for secure conferencing |
Country Status (1)
| Country | Link |
|---|---|
| US (1) | US8223673B2 (en) |
Cited By (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080141331A1 (en) * | 2006-12-07 | 2008-06-12 | Cisco Technology, Inc. | Identify a secure end-to-end voice call |
| WO2008127115A1 (en) * | 2007-04-17 | 2008-10-23 | Ole Hansvold | Detachable secure videoconferencing module |
| US20090216837A1 (en) * | 2008-02-25 | 2009-08-27 | Microsoft Corporation | Secure reservationless conferencing |
| US20100034201A1 (en) * | 2008-08-08 | 2010-02-11 | Amit Prakash Barave | Method and apparatus for unicast and multicast media processing |
| US20140297807A1 (en) * | 2013-03-28 | 2014-10-02 | Ittiam Systems Pte. Ltd. | System and method for virtual social colocation |
| CN110012260A (en) * | 2019-03-18 | 2019-07-12 | 苏州科达科技股份有限公司 | A kind of video conference content guard method, device, equipment and system |
| WO2020046402A1 (en) * | 2018-08-31 | 2020-03-05 | Halloo Incorporated | System and method for broadcasting from a group of speakers to a group of listeners |
| US11089160B1 (en) * | 2015-07-14 | 2021-08-10 | Ujet, Inc. | Peer-to-peer VoIP |
| US20220094725A1 (en) * | 2018-09-12 | 2022-03-24 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling streaming of multimedia data in a network |
| US20230421621A1 (en) * | 2019-06-11 | 2023-12-28 | Nextiva, Inc. | Mixing and Transmitting Multiplex Audiovisual Information |
Families Citing this family (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10057218B2 (en) * | 2014-07-28 | 2018-08-21 | The Boeing Company | Network address-based encryption |
| US9866383B2 (en) | 2015-10-28 | 2018-01-09 | Cisco Technology, Inc. | Key management for privacy-ensured conferencing |
| US12242446B2 (en) | 2019-04-19 | 2025-03-04 | EMC IP Holding Company LLC | Generating and morphing a collection of databases that collectively has desired dedupability, compression, clustering and commonality |
| US11283853B2 (en) * | 2019-04-19 | 2022-03-22 | EMC IP Holding Company LLC | Generating a data stream with configurable commonality |
| US10997053B2 (en) | 2019-04-19 | 2021-05-04 | EMC IP Holding Company LLC | Generating a data stream with configurable change rate and clustering capability |
| US11455281B2 (en) | 2019-04-19 | 2022-09-27 | EMC IP Holding Company LLC | Generating and morphing a collection of files in a folder/sub-folder structure that collectively has desired dedupability, compression, clustering and commonality |
| US12287733B2 (en) | 2022-01-27 | 2025-04-29 | Dell Products L.P. | Enhancements to datagen algorithm to gain additional performance for L1 dataset |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030185369A1 (en) * | 2002-03-29 | 2003-10-02 | Oliver Neal C. | Telephone conference bridge provided via a plurality of computer telephony resource algorithms |
| US20050084094A1 (en) * | 2003-10-21 | 2005-04-21 | Alcatel | Telephone terminal with control of voice reproduction quality in the receiver |
-
2005
- 2005-11-16 US US11/281,143 patent/US8223673B2/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030185369A1 (en) * | 2002-03-29 | 2003-10-02 | Oliver Neal C. | Telephone conference bridge provided via a plurality of computer telephony resource algorithms |
| US20050084094A1 (en) * | 2003-10-21 | 2005-04-21 | Alcatel | Telephone terminal with control of voice reproduction quality in the receiver |
Cited By (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080141331A1 (en) * | 2006-12-07 | 2008-06-12 | Cisco Technology, Inc. | Identify a secure end-to-end voice call |
| US7852783B2 (en) * | 2006-12-07 | 2010-12-14 | Cisco Technology, Inc. | Identify a secure end-to-end voice call |
| WO2008127115A1 (en) * | 2007-04-17 | 2008-10-23 | Ole Hansvold | Detachable secure videoconferencing module |
| US20090216837A1 (en) * | 2008-02-25 | 2009-08-27 | Microsoft Corporation | Secure reservationless conferencing |
| US20100034201A1 (en) * | 2008-08-08 | 2010-02-11 | Amit Prakash Barave | Method and apparatus for unicast and multicast media processing |
| US8107403B2 (en) * | 2008-08-08 | 2012-01-31 | Cisco Technology, Inc. | Method and apparatus for unicast and multicast media processing |
| US20140297807A1 (en) * | 2013-03-28 | 2014-10-02 | Ittiam Systems Pte. Ltd. | System and method for virtual social colocation |
| US9736203B2 (en) * | 2013-03-28 | 2017-08-15 | Ittiam Systems Pte. Ltd. | System and method for virtual social colocation |
| US11089160B1 (en) * | 2015-07-14 | 2021-08-10 | Ujet, Inc. | Peer-to-peer VoIP |
| WO2020046402A1 (en) * | 2018-08-31 | 2020-03-05 | Halloo Incorporated | System and method for broadcasting from a group of speakers to a group of listeners |
| US20220094725A1 (en) * | 2018-09-12 | 2022-03-24 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling streaming of multimedia data in a network |
| US11876840B2 (en) * | 2018-09-12 | 2024-01-16 | Samsung Electronics Co., Ltd. | Method and apparatus for controlling streaming of multimedia data in a network |
| CN110012260A (en) * | 2019-03-18 | 2019-07-12 | 苏州科达科技股份有限公司 | A kind of video conference content guard method, device, equipment and system |
| US20230421621A1 (en) * | 2019-06-11 | 2023-12-28 | Nextiva, Inc. | Mixing and Transmitting Multiplex Audiovisual Information |
Also Published As
| Publication number | Publication date |
|---|---|
| US8223673B2 (en) | 2012-07-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8223673B2 (en) | Method and system for secure conferencing | |
| EP2100397B1 (en) | Audio conferencing utilizing packets with unencrypted power level information | |
| US7822811B2 (en) | Performance enhancements for video conferencing | |
| US7313593B1 (en) | Method and apparatus for providing full duplex and multipoint IP audio streaming | |
| US8824684B2 (en) | Dynamic, selective obfuscation of information for multi-party transmission | |
| US20020078153A1 (en) | Providing secure, instantaneous, directory-integrated, multiparty, communications services | |
| US8614732B2 (en) | System and method for performing distributed multipoint video conferencing | |
| US8107403B2 (en) | Method and apparatus for unicast and multicast media processing | |
| US8537743B2 (en) | Priority-based multimedia stream transmissions | |
| US9124706B2 (en) | Method and system for interoperation between multiple conference systems | |
| CN113347215B (en) | Encryption method for mobile video conference | |
| US20250140246A1 (en) | Real-time summarization of virtual conference transcripts | |
| US11800017B1 (en) | Encoding a subset of audio input for broadcasting conferenced communications | |
| US20220078169A1 (en) | Methods, systems, and media for providing secure network communications | |
| CN102594794B (en) | Access method and device of media encryption conference | |
| US20240146873A1 (en) | Screen Share Collaboration Platform Capture | |
| Hasselquist et al. | Now is the time: Scalable and cloud-supported audio conferencing using end-to-end homomorphic encryption | |
| KR102545276B1 (en) | Communication terminal based group call security apparatus and method | |
| Ismail | Analysis of secure real time transport protocol on VoIP over wireless LAN in campus environment | |
| US20100056194A1 (en) | Identifying channels in a communication network | |
| US12301638B1 (en) | Identifying relevant content for video conferences | |
| US12335059B1 (en) | Enriching event assets for video conferences via aggregating content in a lifecycle of a video conference | |
| CN111770301A (en) | Method and device for processing video conference data | |
| US20250260790A1 (en) | Online meeting summarization for videoconferencing | |
| WO2023184200A1 (en) | Conference call system with feedback |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| AS | Assignment |
Owner name: CISCO TECHNOLOGY, INC.,CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MIRIYALA, PRASAD;TADA, FRED;KONDA, PRAVEEN;SIGNING DATES FROM 20051101 TO 20051107;REEL/FRAME:017234/0371 Owner name: CISCO TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MIRIYALA, PRASAD;TADA, FRED;KONDA, PRAVEEN;SIGNING DATES FROM 20051101 TO 20051107;REEL/FRAME:017234/0371 |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
| FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| FPAY | Fee payment |
Year of fee payment: 4 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
| MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |